Your identity is something valuable and identity theft in the digital world can have real life consequences. Protection is a shared responsibility.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
The 'only install applications from a trusted source' mantra no longer holds true, as supply chain attacks bypass malware detection solutions and practices.
Phishing attacks account for 49% of cybercrime, making them the biggest threat to your company's cyber security. Is your company and employees protected?
With six million Instagram accounts hacked, are passwords now a liability and is it time to turn on that Instagram two-factor authentication?
Indian government subjects phone makers to cyber security standards and are required to report their hardware, software and network security measures by August 28th.
Last week, Google announced the removal of around 300 Android apps found with malware that secretly hijacks your phone to...
Imperva reversed the phishing hook to hack the hackers, proving that these 'professionals' are just as susceptible – and in the process reveals some very important anti-hacker lessons.
With rising risks of Internet of Things, the draft of the NIST 800-53 revision 5 addresses IoT security and privacy challenges head on.
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats.
Ransomware attacks are the frightening new hacking phenomenon that is hitting businesses all over the world. Here are five ways to stop ransomware attacks.